International Journal of Ad Hoc and Ubiquitous Computing最新文献

筛选
英文 中文
A Hybrid Channel Transmission Method for Effective Spectrum Access in Cognitive Radio Networks 认知无线网络中有效频谱接入的混合信道传输方法
4区 计算机科学
International Journal of Ad Hoc and Ubiquitous Computing Pub Date : 2023-01-01 DOI: 10.1504/ijahuc.2023.10058936
Isaac Woungang, Bhoopendra Kumar, S.K. Dhurandher, Han Chieh Chao Han Chieh Chao
{"title":"A Hybrid Channel Transmission Method for Effective Spectrum Access in Cognitive Radio Networks","authors":"Isaac Woungang, Bhoopendra Kumar, S.K. Dhurandher, Han Chieh Chao Han Chieh Chao","doi":"10.1504/ijahuc.2023.10058936","DOIUrl":"https://doi.org/10.1504/ijahuc.2023.10058936","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135312761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A two dimensional Markov chain model for aggregation-enabled 802.11 networks 支持聚合的802.11网络的二维马尔可夫链模型
4区 计算机科学
International Journal of Ad Hoc and Ubiquitous Computing Pub Date : 2023-01-01 DOI: 10.1504/ijahuc.2023.130467
Kaouther Mansour
{"title":"A two dimensional Markov chain model for aggregation-enabled 802.11 networks","authors":"Kaouther Mansour","doi":"10.1504/ijahuc.2023.130467","DOIUrl":"https://doi.org/10.1504/ijahuc.2023.130467","url":null,"abstract":"Frame aggregation technique opts for optimising channel usage efficiency for 802.11-based networks by amortising the transmission overhead over several aggregated packets. Despite its potential benefit, the gain achieved by this technique is still far from the expected levels. The underlying causes are attributed to certain deficiencies in the specification as well as the implementation of the conventional frame aggregation scheme. Throughout this paper, we focus on MAC protocol data unit aggregation (A-MPDU) technique. We provide a simple, yet, highly accurate mathematical model for the conventional A-MPDU technique that reflects the effect of the block acknowledgement (Block Ack) window limit on the maximum aggregation size. The effectiveness of our model is validated by ns-3 simulator. An analytical-based study is further conducted to compare the performance of the greedy A-MPDU aggregation scheme and that of the conservative scheme supported by most of wireless fidelity (Wi-Fi) card drivers.","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135637432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Insider threat detection and prevention using semantic score and dynamic multi-fuzzy classifier 基于语义评分和动态多模糊分类器的内部威胁检测与预防
IF 0.7 4区 计算机科学
International Journal of Ad Hoc and Ubiquitous Computing Pub Date : 2023-01-01 DOI: 10.1504/ijahuc.2022.10046481
Malvika Singh, S. Sangeetha, B. Mehtre
{"title":"Insider threat detection and prevention using semantic score and dynamic multi-fuzzy classifier","authors":"Malvika Singh, S. Sangeetha, B. Mehtre","doi":"10.1504/ijahuc.2022.10046481","DOIUrl":"https://doi.org/10.1504/ijahuc.2022.10046481","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74390236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A bigraphical approach to model and verify ontology alignment 建模和验证本体一致性的图形方法
IF 0.7 4区 计算机科学
International Journal of Ad Hoc and Ubiquitous Computing Pub Date : 2023-01-01 DOI: 10.1504/ijahuc.2022.10052920
Manel Kolli
{"title":"A bigraphical approach to model and verify ontology alignment","authors":"Manel Kolli","doi":"10.1504/ijahuc.2022.10052920","DOIUrl":"https://doi.org/10.1504/ijahuc.2022.10052920","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81780843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time face mask position recognition system using YOLO models for preventing COVID-19 disease spread in public places 基于YOLO模型的实时口罩位置识别系统在公共场所预防新冠病毒传播
IF 0.7 4区 计算机科学
International Journal of Ad Hoc and Ubiquitous Computing Pub Date : 2023-01-01 DOI: 10.1504/ijahuc.2023.10053539
V. K. Kaliappan, Rajasekaran Thangaraj, P. Pandiyan, K. M. Sundaram, S. Anandamurugan, Dugki Min
{"title":"Real-time face mask position recognition system using YOLO models for preventing COVID-19 disease spread in public places","authors":"V. K. Kaliappan, Rajasekaran Thangaraj, P. Pandiyan, K. M. Sundaram, S. Anandamurugan, Dugki Min","doi":"10.1504/ijahuc.2023.10053539","DOIUrl":"https://doi.org/10.1504/ijahuc.2023.10053539","url":null,"abstract":"The COVID-19 pandemic has infected tens of millions of individuals around the world, and it is currently posing a worldwide health calamity. Wearing a face mask in public places is one of the most effective protection strategies, according to the World Health Organization (WHO). Moreover, their effectiveness has declined due to incorrect use of the face mask. In this scenario, effective recognition systems are anticipated to ensure that people's faces are covered with masks in public locations. Many people do not correctly wear the masks due to inadequate practices, undesirable behaviour, or individual vulnerabilities. As a result, there has been an increase in demand for automatic real-time face mask detection and mask position detection to substitute manual reminders. This proposed work classifies people into three categories such as with mask, without mask and mask with incorrect position. The dataset is tested using three different variants of object detection models, namely YOLOv4, Tiny YOLOv4, and YOLOv5. The experimental result shows that YOLOv5 model outperforms with the highest mAP value of 99.40% compared to the other two models.","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83878067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey of intelligent load monitoring in IoT-enabled distributed smart grids 基于物联网的分布式智能电网智能负荷监测研究
IF 0.7 4区 计算机科学
International Journal of Ad Hoc and Ubiquitous Computing Pub Date : 2023-01-01 DOI: 10.1504/ijahuc.2023.10052678
Xiaodong Liu, Jixiang Gan, Lei Zeng, Qi Liu
{"title":"A survey of intelligent load monitoring in IoT-enabled distributed smart grids","authors":"Xiaodong Liu, Jixiang Gan, Lei Zeng, Qi Liu","doi":"10.1504/ijahuc.2023.10052678","DOIUrl":"https://doi.org/10.1504/ijahuc.2023.10052678","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89201399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusion detection system using resampled dataset - a comparative study 使用重采样数据集的入侵检测系统的比较研究
IF 0.7 4区 计算机科学
International Journal of Ad Hoc and Ubiquitous Computing Pub Date : 2023-01-01 DOI: 10.1504/ijahuc.2022.10050801
N. Patel, B. Mehtre, R. Wankar
{"title":"Intrusion detection system using resampled dataset - a comparative study","authors":"N. Patel, B. Mehtre, R. Wankar","doi":"10.1504/ijahuc.2022.10050801","DOIUrl":"https://doi.org/10.1504/ijahuc.2022.10050801","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76386426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G network traffic control: a temporal analysis and forecasting of cumulative network activity using machine learning and deep learning technologies 5G网络流量控制:利用机器学习和深度学习技术对累积网络活动进行时间分析和预测
4区 计算机科学
International Journal of Ad Hoc and Ubiquitous Computing Pub Date : 2023-01-01 DOI: 10.1504/ijahuc.2023.127766
Ramraj Dangi, Praveen Lalwani, Manas Kumar Mishra
{"title":"5G network traffic control: a temporal analysis and forecasting of cumulative network activity using machine learning and deep learning technologies","authors":"Ramraj Dangi, Praveen Lalwani, Manas Kumar Mishra","doi":"10.1504/ijahuc.2023.127766","DOIUrl":"https://doi.org/10.1504/ijahuc.2023.127766","url":null,"abstract":"In fifth generation (5G), traffic forecasting is one of the target areas for research to offer better service to the users. In order to enhance the services, researchers have provided deep learning models to predict the normal traffic, but these suggested models are failing to predict the traffic load during the festivals time due to sudden changes in traffic conditions. In order to address this issue, a hybrid model is proposed which is the combination of autoregressive integrated moving average (ARIMA), convolutional neural network (CNN) and long short-term memory (LSTM), called as ARIMA-CNN-LSTM, where we forecast the cumulative network traffic over specific intervals to scale up and correctly predict the availability of 5G network resources. In the comparative analysis, the ARIMA-CNN-LSTM is evaluated with well-known existing models, namely, ARIMA, CNN and LSTM. It is observed that the proposed model outperforms the other tested deep learning models in predicting the output in both usual and unusual traffic conditions.","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136008722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Transcend: an ownership-based resource allocation strategy for service function chaining in NFV empowered 6G network using latency and user cost-awareness Transcend:基于所有权的资源分配策略,用于NFV支持的6G网络中的业务功能链,利用延迟和用户成本意识
IF 0.7 4区 计算机科学
International Journal of Ad Hoc and Ubiquitous Computing Pub Date : 2023-01-01 DOI: 10.1504/ijahuc.2023.10053812
Mahfuzulhoq Chowdhury
{"title":"Transcend: an ownership-based resource allocation strategy for service function chaining in NFV empowered 6G network using latency and user cost-awareness","authors":"Mahfuzulhoq Chowdhury","doi":"10.1504/ijahuc.2023.10053812","DOIUrl":"https://doi.org/10.1504/ijahuc.2023.10053812","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72971274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge-based flexible resource allocation optimisation strategy for multi-tenant radio access network slicing in 5G and B5G 基于知识的5G和B5G多租户无线接入网切片灵活资源分配优化策略
IF 0.7 4区 计算机科学
International Journal of Ad Hoc and Ubiquitous Computing Pub Date : 2023-01-01 DOI: 10.1504/ijahuc.2023.10053535
Naveen Kumar, Anwar Ahmad
{"title":"Knowledge-based flexible resource allocation optimisation strategy for multi-tenant radio access network slicing in 5G and B5G","authors":"Naveen Kumar, Anwar Ahmad","doi":"10.1504/ijahuc.2023.10053535","DOIUrl":"https://doi.org/10.1504/ijahuc.2023.10053535","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80673808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信